Microsoft Fixes Serious Windows Vulnerability that was Identified Six Months Ago Microsoft has recently patched a critical vulnerability, CVE-2024-21338, in Windows that permitted a user to acquire escalated privileges.… byJulia Jackson03/11/2024
Microsoft: hackers stole part of the source code and continue attacks Microsoft, the multinational technology corporation, has reported the theft of some source code fragments by a Russian-linked hacking… byJulia Jackson03/10/2024
A new network worm has emerged, operating through AI services — it replicates, distributes spam, and steals data. A novel type of cyber-attack, delivered through generative artificial intelligence (AI) services, has been developed by an international… byJulia Jackson03/03/2024
Court Orders NSO Group to Share Pegasus Spyware Code with WhatsApp Developers The US court has mandated Israeli spyware developer, NSO Group to furnish the source code of its product… byHarry Males03/02/2024
Hackers have reportedly obtained nearly 200 Gigabytes of internal data from Epic Games, although this remains unconfirmed. According to a Cyber Daily report, the hacker group Mogilevich announces its biggest coup yet – breaking into… byJulia Jackson02/28/2024
Hacked Wireless Chargers Could Melt Smartphones and Cause Fires, Researchers Show Florida University researchers have found that wireless chargers could be exploited destructively. In their study, they demonstrated potential… byJulia Jackson02/25/2024
The LockBit Ransomware is Being Spread Through a Vulnerability in the ConnectWise Remote Access Software Cybercriminals are taking advantage of two serious vulnerabilities in the remote access software ConnectWise ScreenConnect to deploy the… byHarry Males02/24/2024
Avast Fined $16.5 Million for Selling User Data and Will No Longer Trade It The US Federal Trade Commission (FTC) has issued a ruling banning antivirus software developer, Avast, from selling web… byMatthew Harmon02/23/2024
Apple Protects iMessage Conversations from Sophisticated Quantum Attacks Apple has announced a groundbreaking post-quantum encryption protocol called PQ3 for iMessage. The company characterizes this new encryption… byHenry02/22/2024
Chrome will protect users’ internal resources from external attacks Chromium Engine to Implement Protective Feature for User Resources The Chromium engine, which forms part of the Google… byMatthew Harmon02/20/2024